Re: [tor-relays] doc/HARDENING Draft

2014-11-25 Thread tor
Hi, On Tue, Nov 25, 2014 at 08:58:04PM +0100, tor-ad...@torland.me wrote: > Don't store identity keys on the hard disk. Keep them offliner. Use a ramdisk > for /var/lib/tor/keys/ and copy keys to it via scp before starting your tor > instance. Remove it from the ramdisk after s

Re: [tor-relays] doc/HARDENING Draft

2014-11-27 Thread tor
tcp from any to port = flush global) label "ssh: in " You can adjust the parameters to control when a host is blacklisted and for how long. -- regards alex ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] doc/HARDENING Draft

2014-11-30 Thread tor
ying if you have trouble or want a solution without any extra software, the firewalls can do this. > You also reminded me of a big factor I forgot to mention in the doc: > firewalls. > Hehe no problem. Thx for putting up with the effort to create such a doc. -- regards alex __

[tor-relays] question and concering about probability of exitnode

2015-02-08 Thread tor
hi, just want to note, i am proud to have an german exit node with 11Mbs .. but also concerned about this raising exit node probability, actually it reads for me like 1 of 400 tor-users is going through this exit (by recalculating a exit probability of 0.25 %) - this concerns me because it

Re: [tor-relays] question and concering about probability of exitnode

2015-02-10 Thread tor
Thx for your Answer, i think ive managed to configure the tor service properly, my concerncs were about how easy it is to get one out of 3-400 Tor users through your specific exit, and somehow i think this should not be possible so easy. so here the Atlas link, where you can see with 10Mbit/s

Re: [tor-relays] "Very Safe" Exit Policy

2015-02-11 Thread tor
43, and 6667 and allows exits to at >least one /8 address space. I'd love to see 6697 in this set as an alternative to 6667. Irrespective of the fact that you can - and many people do - speak irc over lots of different ports, this is the one most often used for IRC via TLS. ____

Re: [tor-relays] Quantum Insert detection for everyone

2015-04-23 Thread tor
here was interest from enough people. Gief. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Leaseweb exit relay notice

2015-05-25 Thread tor
m OVH because DanTor recorded my relays, > then CBL recorded DanTor, then SpamHaus Zen recorded CBL, which allowed > OVH to claim "100% of your IPs are blacklisted on multiple lists" when > in reality it was from a guy in the UK who publishes all Tor relays - > guard, middle, ex

Re: [tor-relays] Leaseweb exit relay notice

2015-05-25 Thread tor
to some (or > most or even all) of the nodes that are discussed in this thread. > I'd be curious to know what this checker says about the IP address that ultimately got this ISPs attention: http://mxtoolbox.com/blacklists.aspx I run 2 fast exits with only ports 25 and 465 rejected.

Re: [tor-relays] Keeping an exit node off of blacklists due to botnet activity.

2015-06-05 Thread tor
# Cryptolocker ExitPolicy reject 173.193.197.194 # Cryptolocker In general, I see complaints about abuse from the exit relays we run due to someone using Tor to try to exploit remote web server scripts and databases and the like. I don't think there's anything that can be done about

Re: [tor-relays] webiron requesting to block several /24 subnet

2015-10-21 Thread tor
Dear yl, just a few words from the abuse helpdesk of a larger tor-exit-node... TL;DR: we ignore those requests. they don't even reach a human. While we do handle most genuine/honest/helpful and especially all non-automated abuse reports very diligently. Pointless nagging services like we

Re: [tor-relays] Opt-In Trial: Fallback Directory Mirrors

2015-12-17 Thread tor
Mathewson :   TL;DR: Stable non-exit relays can help tor clients use the Tor network. Please opt-in! We want to run a trial of fallback directory mirrors (fallbacks) in Tor. Tor clients contact fallbacks to download the consensus during initial bootstrap, before they contact the directory authorities

Re: [tor-relays] Exit relay funding

2016-03-09 Thread tor
00mbit/s over two years now and we'll do what we do even without your funding however BTC donations are much appreciated and will be used for hardware upgrades. Cheers. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproj

Re: [tor-relays] Exit relay funding

2016-03-09 Thread tor
(as september last year) Other factors probably also play a role. If anyone can contribute their opinion based on their experience and the publicly available data, feel free! Cheers. _______ tor-relays mailing list tor-relays@lists.torproj

[tor-relays] Question about TOR bandwidth management

2013-08-13 Thread tor
Hello, Is it possible to configure a TOR node to have different bandwidth limits at different times of day and on different days of the week? Thank you. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi

Re: [tor-relays] Key files encryption methods.

2013-08-21 Thread tor
both. It is assumed that passing the traffic through the private switch isn't a meaningful security concern. What that means to tor server operators is that if you're using a vserver where the internals are set up this way, the unencrypted contents of your disk are likely being expos

Re: [tor-relays] What if my favorite online store websiteblacklists all Tor Relay IP addresses?

2013-08-25 Thread tor
Likely someone was doing credit card fraud/hacking type stuff and choosing Tor as the way to connect for it. That stuff is a pain in the ass for online stores when it happens. Not surprised that outfits handling online payments don't want Tor connections, and I can't blame them

Re: [tor-relays] Store key files in RAM

2013-08-26 Thread tor
hosting is set up. On Monday 26/08/2013 at 10:53 pm, Tony Xue wrote: Hi, I have been discovering simple and secure way of protecting the Tor key files recently, in order to achieve the safety of the keys on VPS. So I created a folder on Linux called /tor and it is stored in the

Re: [tor-relays] Store key files in RAM

2013-08-27 Thread tor
ge system of the vserver? Date: Tue, 27 Aug 2013 00:14:36 -0400 From: t...@t-3.net To: Subject: Re: [tor-relays] Store key files in RAM Message-ID: <521c27ac.570.f998d700.4984...@t-3.net> Content-Type: text/plain; charset="us-ascii"; Format="flowed" IMO cut and paste in the

Re: [tor-relays] new relays

2013-08-27 Thread tor
A mechanism which empowers detecting and stopping what you and I consider to be 'evil' could be harnessed and used to target non-evil things, and that's where the problem is. Let's pretend that tomorrow, Tor gained the ability to filter out evil images. Shortly thereafte

Re: [tor-relays] huge increase in relay traffic

2013-08-30 Thread tor
my exit's too. (as well as nearly double the amount of connections). -Stracci - Original Message - From: "mick" To: tor-relays@lists.torproject.org Sent: Friday, August 30, 2013 9:27:12 AM Subject: [tor-relays] huge increase in relay traffic I'm currently

Re: [tor-relays] huge increase in relay traffic

2013-08-30 Thread tor
0' while fetching " And then there is a very long string designating a path which starts with "/tor/server" and then has a whole bunch of 40-digit hexadecimal numbers separated with + signs, and then the whole thing ends with a single ".z". Then the line says "I&

Re: [tor-relays] A bit more evidence on circuit creation storms

2013-08-30 Thread tor
I added a second core to my server and it's still getting "Your computer is too slow..." error messages. Top shows cpu for the Tor process hanging around 60-75%, which is where it was before. Top's system total is hanging around "Cpu(s) 25.9%". That plus the VM

Re: [tor-relays] new relays

2013-08-31 Thread tor
This thread did go goofy and bad (and off-topic, given the subject in the emails). It seems clear that there are important reasons Tor could never begin examining/taking direct responsibility for/filtering the content that flows through it (as opposed with disallowing specific ports, which is

Re: [tor-relays] Someone is trying to overrun the Network

2013-09-01 Thread tor
ddos_dirtjumper". Behavior last seen 14 hours ago. Read a little about it - wondering if it requires a malicious Tor user to cause a machine to make this kind of traffic flow through Tor, or if an infected victim using Tor would be enough. Seems exit node operators may be able to stop this

Re: [tor-relays] new relays

2013-09-01 Thread tor
I feel like you are SO missing the point. Making Tor block morally horrible things does not involve telling exit notes to block traffic to known porn sites. The porn sites with the boobies that someone might hit on port 80 on the public internet represent the Catholic Church of porn

Re: [tor-relays] Someone is trying to overrun the Network

2013-09-03 Thread tor
Here is what Top on our Tor relay is doing today: PID USER PR NI VIRT RES SHR S %CPU %MEMTIMECOMMAND 1163 _tor 20 0 628m 286m 34m R 106.3 15.3 4693:47 tor Logs filled with: Sep 03 04:12:20.000 [warn] Your computer is too slow to handle this many circuit creation

[tor-relays] Tor node was doing more traffic than its bandwidth is configured for

2013-09-07 Thread tor
lp. I did a service restart on it to bring it back down. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Tor node was doing more traffic than its bandwidthis configured for

2013-09-08 Thread tor
Are you sure you didn't confuse bits and bytes? Tor counts in bytes. (The arm monitor, if that's what you're using, counts in bits by default.) As with real networks and operators, if this is so, then big thank you to arm people for correctly counting network bandwidth in bps

Re: [tor-relays] Running Bind locally

2013-09-10 Thread tor
subnet, and another couple IPs, maybe? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread tor
___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread tor
n involved, and nothing personal intended. It may be worth noting that certain presumably-Tor-hostile and well-funded agencies are known to infiltrate the tech organizations/efforts which they wish to weaken, and influence them from the inside. In this context, seeing Tor's exit node oper

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread tor
ntact pgp 0x6B4D6475 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://list

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread tor
r work, making their crypto be weaker/breakable and their systems easier to hack into. They use the vulnerabilities they created to their own ends. As of today, Tor appears to provide privacy, at least as far as the .onion sites goes. Maybe it even works for it's entire function of pro

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-21 Thread tor
transfer would change anything about that? It's not all about the method. Thoughts are: - One way to damage Tor would be to mess things up for exit node operators either personally or professionally. IMO the less 'they' know about exit operators, the less damage they can

Re: [tor-relays] NSA v TOR Guardian article

2013-10-05 Thread tor
___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Advice on dealing with ISP's response to DMCA takedownnotice.

2013-10-25 Thread tor
Reply to the email, say that you found a misconfiguration in your Tor daemon which could have accounted for this problem and you've repaired it, and hopefully this problem is resolved for the future. Put the below as your exit policy in torrc, and I'd stop/start the service to

Re: [tor-relays] Advice on dealing with ISP's response to DMCAtakedownnotice.

2013-10-30 Thread tor
itPolicy accept *:1723 # PPTP How are you getting PPTP to work over Tor? The ISP-supplied modems i've seen won't pass IP protocol 47 (GRE) packets without putting the target machine in a DMZ. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy contains it. It

Re: [tor-relays] Advice on dealing with ISP's response toDMCAtakedownnotice.

2013-10-30 Thread tor
see zero abuse complaints, if there were a | good way to do that. | | | | | On Wednesday 30/10/2013 at 6:41 am, Moritz Bartl wrote: | > On 25.10.2013 19:13, krishna e bera wrote: | >> | >>> | >>> ExitPolicy accept *:1723 # PPTP | >> How are you getting PPTP t

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread tor
ive exit restriction policy in the responses to take-down > demands seems like a good idea. > > Robert _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Amazon abuse report

2013-11-03 Thread tor
nection :) Pretty decent speeds, unlimited bandwidth: http://www.speedtest.net/result/3001260636.png > Thank you for running an exit relay! I wasn't using my connection for much of anything else and after reading about Tor in the Snowden files I f

[tor-relays] Legal implications of tor relays

2014-01-20 Thread tor
Hi list,   I have set up a tor relay with no exit functionality yet. Having read through the documentation and general legal hints, I am still unsure of the legal situation in Germany. Are there some of you guys who had contact with hosting providers because of abuse claims? Is there

[tor-relays] Would be good if Tor were more multithreaded.

2014-01-24 Thread tor
Here's where top hangs out on Libero. Seems it would be a better situation if Tor would actually use the second core. top - 12:05:07 up 5 days, 21:35, 1 user, load average: 0.33, 0.43, 0.34 Tasks: 130 total, 2 running, 128 sleeping, 0 stopped, 0 zombie Cpu0 : 47.2%us, 21.0%sy,

Re: [tor-relays] Would be good if Tor were more multithreaded.

2014-01-24 Thread tor
chase a little temporary Safety, deserve > neither Liberty nor Safety. > -- > Benjamin Franklin (1706 - 1790), Inventor, > journalist, printer, diplomat, and statesman > > > > Here's where top hangs out on Libero. Seems it wou

[tor-relays] A little bedtime story about relays and OVH

2014-01-25 Thread tor
Hi list,   as I am in the progress of looking for a dedicated box to host a high volume relay on, as one of my current Tor-VPSs has some TCP limitations so I took it down. After doing some reasearch, my shortlist came up with OVH. After reading their (awfully translated: Babelfish French to

Re: [tor-relays] A little bedtime story about relays and OVH

2014-01-25 Thread tor
Grah,   please don't mind the confusing opening. I was kind of distracted ;)   Cheers.   Gesendet: Samstag, 25. Januar 2014 um 16:15 Uhr Von: t...@gmx.info An: tor-relays@lists.torproject.org Betreff: [tor-relays] A little bedtime story about relays and OVH Hi list,   as I am i

[tor-relays] Working init script for TOR 2.5.1

2014-02-16 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, i search a working init script for multiple tor instances. I tried it from https://www.torservers.net/misc/config/initd-tor but that is broken. Does somebody have a working one? Thanks for help -BEGIN PGP SIGNATURE

Re: [tor-relays] Working init script for TOR 2.5.1

2014-02-17 Thread tor
Johannes Fürmann: > On 02/16/2014 09:55 PM, t...@afo-tm.org wrote: >> i search a working init script for multiple tor instances. I tried it >> from https://www.torservers.net/misc/config/initd-tor but that is >> broken. Does somebody have a working one? > Hi! > > I

[tor-relays] IPV6 exit

2014-03-09 Thread tor
e to do to be able to connect via tor to ipv6? Thanks for help _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] IPV6 exit

2014-03-15 Thread tor
ipV6 destination. Did i miss something? what else > to do to be able to connect via tor to ipv6? > > Thanks for help > For people that are interestet in that to here the solution. You have to set on Clients "SocksPort 0.0.0.0:9150 IPv6Traffic PreferIPv6" to make IPV6 work _

Re: [tor-relays] Heartbleed" Exchange of keys now or later?

2014-04-09 Thread tor
der how long it will take our relays to recover? I wonder if it is a good idea, or technically feasible, to do a one time kick-over of something in the Tor network so that the system sees what the relay flags etc. should be on these emergency-redefined relays. Certainly if everyone updated

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-09 Thread tor
le, were never vulnerable to this bug. I imagine there are some > FreeBSD or the like people out there in a similar boat. And Centos > people, etc. > > --Roger > > ___________ > tor-relays mailing list > tor-relays@lists.torproject.org >

Re: [tor-relays] Recommended reject lines for relays affected by Heartbleed

2014-04-17 Thread tor
Perl script attached which I made to take this !reject formatted list of bleeding tor nodes and reformat it into a mega-long ExcludeNodes line and put it at the end of my exit node's torrc. My tor daemon did not bomb or complain upon seeing the line. Hopefully that is the right way t

[tor-relays] obfs4proxy on arm64

2023-01-12 Thread tor
Hi Where do I find the updated version of obfs4proxy for arm64? -m On Wed, Jan 11, 2023 at 7:00 AM wrote: > Send tor-relays mailing list submissions to > tor-relays@lists.torproject.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists

[tor-relays] obfs4proxy ubuntu jammy arm64

2023-01-13 Thread tor
emove and 0 not upgraded. Where do I get version 14? -m On Fri, Jan 13, 2023 at 7:00 AM wrote: > Send tor-relays mailing list submissions to > tor-relays@lists.torproject.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.torproject

[tor-relays] backports obfs4proxy unsigned

2023-01-14 Thread tor
the backport of obfs4proxy seems to be unsigned I needed to use: deb [trusted=yes] http://deb.debian.org/debian bullseye-backports main ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor

Re: [tor-relays] RFC: does a private exit would work?

2023-03-04 Thread tor
Be aware that attacks against you will be possible, since any traffic coming from that IP is only used by you. Unlike normal Tor users where they blend and hide amongst each other. You will be the only exit user. A personal VPN might provide similar anonymity and be easier to manage and run

[tor-relays] Instructions for setting up an Obfs4 bridge on windows

2023-07-03 Thread tor
Hi, I'm attempting to follow the instructions for setting up a obfs4 bridge on Windows. In my instance, it is Windows 10. The instructions say to copy out the obfs4proxy.exe from: C:\Users\\Desktop\Tor Browser\Browser\TorBrowser\Tor\PluggableTransports However, there is no obfs4 file in

Re: [tor-relays] Discuss. Why not split donations to Tor relay owners?

2023-10-12 Thread tor
Hi, <https://reiya.io/> exists. Something like this? There is a legal reason the Tor project doesn't fund nodes. Regards, On October 12, 2023 11:41:58 AM UTC, torrrel...@riseup.net wrote: >I provided some high speed Tor nodes (non-exits and guards) but I quit >in this year t

[tor-relays] Warn_TorBTCMoon

2024-05-26 Thread tor
? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Tor non-exit list

2024-06-19 Thread tor
that asking to remove the complete non-exit list to be valuable to the security of the global internet. While it is correct that sysadmins should maybe not block traffic just because it's a relay. There is many use cases where they should, most corporation end users do not need access to th

Re: [tor-relays] Tor non-exit list

2024-06-20 Thread tor
DAN's (non-exit) Tor relays list on a blocklist by default, or without warning about potential impact to other legitimate services (universities, libraries, shared hosting providers, hobbyist email, etc) Ransomware links are usually opened from emails and Tor is not running on co

Re: [tor-relays] [tor-talk] Tor diversity (was: Explain yourself Conrad Rockenhaus)

2019-05-02 Thread tor
; > Am Donnerstag, 2. Mai 2019 12:10 schrieb René Ladan : > > > > > > > > > > > > > Op do 2 mei 2019 09:43 schreef Tor Revolution > > : > > > > > You are probably trying to push hacked FreeBSD or that hacked

Re: [tor-relays] Become a Fallback Directory Mirror

2019-05-21 Thread tor
renced lists? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Become a Fallback Directory Mirror

2019-06-16 Thread TOR
On 21/05/19, gus wrote: > Dear Relay Operators, > > Do you want your relay to be a Tor fallback directory mirror? > Will it have the same address and port for the next 2 years? > Just reply to this email with your relay's fingerprint. C6B656BA6BC16E31115A

[tor-relays] TCP SACK PANIC type kernel vulnerabilities: logging some packets

2019-06-24 Thread tor
d, but yeah. Things that make you go hmm. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] obfs4 relay lost stable flag

2019-06-30 Thread tor
Hi I've been running an obfs4 bridge for about a month. My hashed fingerprint is: E120A0492F789F5367EAD84C64F92EE279018F98 I recently lost the stable flag. Not sure why. Any thoughts? thanks matt _______ tor-relays mailing list tor-r

Re: [tor-relays] Log warning : possible (zlib) compression bomb on middle relays

2020-11-02 Thread tor
also saw this on my Tor exit dannydevito, but these messages only appeared once in logs (UTC time) Nov  2 04:21:44 dannydevito Tor: Possible zlib bomb; abandoning stream. Nov  2 04:22:42 dannydevito Tor: Possible compression bomb; abandoning stream. Nov  2 04:22:42 dannydevito syslogd: last

Re: [tor-relays] Call for Testing - New Feature: Relay IPv6 Address Discovery

2020-11-27 Thread tor
Hello, I have a hard time trying to correctly update my configuration following this change, with Tor 0.4.5.2 on Ubuntu focal. The machine has both an IPv4 and IPv6 connectivity, but my relay must only use IPv4 to listen for connections. The relevant parts of my configuration before moving

[tor-relays] Sig ver error

2021-02-03 Thread tor
matt _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] sig ver error and more

2021-02-04 Thread tor
Hi All, So everything had been working for over a year. Am currently on tor 4.2.7, stretch. When I went to update, I got: The following signatures were invalid: EXPKEYSIG 74A941BA219EC810 < http://deb.torproject.org/> deb.torproject.org archive signing key My deb.torproject.org--keyr

[tor-relays] key server error

2021-02-07 Thread tor
___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] tor on Ubuntu Server 20.04.2 LTS

2021-02-09 Thread tor
Hi All, Which version of tor runs on Ubuntu Server 20.04.2 LTS 64bit, if any? Thanks matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] bug message from 02/28/2020 on 4.5.6

2021-03-01 Thread tor
Tor circuit x 09:30:52 [NOTICE] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits x 09:30:52 [NOTICE] Bootstrapped 89% (ap_handshake): Finishing handshake with a relay to build circuits x 09:30:52 [NOTICE] Bootstrapped 85% (ap_conn_done): Connected to a relay

[tor-relays] ECONNREFUSED

2021-03-16 Thread tor
achablilty test everything is reachable. However, the status page keeps saying I'm dysfunctional with a ECONNREFUSED: https://bridges.torproject.org/status?id=E120A0492F789F5367EAD84C64F92EE279018F98 So everything seems to be working on my end. -matt _______

Re: [tor-relays] My Family

2021-07-25 Thread tor
gt; > Thank you! :-) > >_______ >tor-relays mailing list >tor-relays@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread tor
wrote: > >Finally, anyone running relays: try to get connected to the community so we >can build some trust among each other. That seems to be an essential part in >our long-term strategy to fight bad relays trying to enter our network. > _______

Re: [tor-relays] Introduction message from me :)

2022-02-01 Thread tor
Can you provide the Tor node fingerprints? Any logs that show they are configured correctly, but the error is on the DirAuths? What steps did you take during deployment? On February 1, 2022 3:19:20 PM UTC, Miryam Webb via tor-relays wrote: >Hello all, > >I am a new relay operator

Re: [tor-relays] Your opinion about tor-node.org

2022-03-03 Thread tor
they "glow in the dark." I think the individual is calling the tor-node.org site a CIA style operation. Or at least that something feels fishy about it. On March 3, 2022 3:40:42 PM UTC, Martin Gebhardt wrote: >Hi Marco, > >On 3/2/22 22:21, li...@for-privacy.net wrote: >&g

[tor-relays] How can I tell if standalone Snowflake is running?

2022-04-07 Thread tor
I installed standalone Snowflake on Ubuntu per these instructions: https://community.torproject.org/relay/setup/snowflake/standalone/. Now how can I tell if it's running? Can I see the number of connections it's serviced? Will it continue after a reboot? Thanks, Chuck Bevitt T

Re: [tor-relays] Possible Connection Storm

2022-04-25 Thread tor
've >receiv >ed 5253283 connections on IPv4 and 270537 on IPv6. I've made 2024515 >connections > with IPv4 and 582464 with IPv6. >Apr 21 15:45:08.000 [notice] Circuit handshake stats since last time: 467/467 >TA >P, 9937327/9984534 NTor. > >Is this anyth

[tor-relays] Relay migration: best practices?

2022-05-29 Thread tor
the past. Is there any other things I can do to disrupt the damage done to the tor network during this downtime? Especially to any clients using it as a bridge. Thanks, OpenPGP_0x45E5F8C1504CDA42.asc Description: OpenPGP public key OpenPGP_signature Description:

[tor-relays] Re: Tor relays source IPs spoofed to mass-scan port 22?

2024-11-05 Thread tor
t; abuse emails get a flood of responses and update their detection scripts. Ideally no one loses any nodes, but it seems to have already happened. Good luck everyone, Dimitris T. via tor-relays: another abuse report from hetzner (by the same watchdogcyberdefence) a few hours ago. no reply from

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

2024-10-31 Thread tor
Dimitris T. via tor-relays" allegedly wrote: similar situation here with hetzner.. got a first report 2 days ago, and just a while ago got another abuse report, by the same watchdogcyberdefence with more alleged activity from our ip... like everybody else, there's nothing coming out f

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

2024-10-30 Thread tor
You likely discovered a way, how criminals (or Intel agencies, since there is no difference) are being allowed access to middle relays. --x9p On 10/29/24 04:47, mick wrote: On Tue, 29 Oct 2024 06:52:13 +0100 Ralph Seichter via tor-relays allegedly wrote: * Pierre Bourdon: A few hours ago

[tor-relays] Tor-Bridge

2023-08-14 Thread tor--- via tor-relays
eys signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Tor Relay Operator meetup @ CCCamp 2023 - Saturday 19th @ 7pm

2023-08-16 Thread tor--- via tor-relays
Hi Gus! Saturday, August 19th at 7pm Isn't that a bit late? Last day at 7PM some will have left already, no? _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Tor Relay Operator meetup @ CCCamp 2023 - Saturday 19th @ 7pm

2023-08-17 Thread tor--- via tor-relays
Yeah, some operators said the same thing to me. Friday at 4pm local time (16 - 17:30) would be better for you? yes, anything before Saturday is better, thanks! ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org

Re: [tor-relays] issues with tor-nightly-main repo

2024-04-19 Thread tor--- via tor-relays
thanks a lot! best regards, t...@appliedprivacy.net ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] tor_bug_reached_count increase

2024-04-19 Thread tor--- via tor-relays
Hello, the new metricsport counter shows that some specific tor relays (2 out of 50) have a significant tor_bug_reached_count rate (around 8 per second). Do you see similar? You have to run on git main or nightly builds to see that metric. best regards, t...@appliedprivacy.net

Re: [tor-relays] Please check if your relay has fallen out of the consensus

2024-10-22 Thread tor-relays+tor-relays
On 22/10/24 12:08, denny.obre...@a-n-o-n-y-m-e.net wrote: I still haven't found a solution to my problem I stated earlier in my email with the subject "Exit relay not in consensus" https:// lists.torproject.org/pipermail/tor-relays/2024-October/021899.html <https://li

Re: [tor-relays] DDOS mitigation with nftables

2024-10-23 Thread tor-relays+tor-relays
On 22/10/24 14:24, Top wrote: Hi all, My tor relays[1] traffic decreased a lot and I think this *might* be connected to some kind of DDOS attack. So I wanted to use this situation to set up some DDOS protection. For that I stumbled upon Enkidus tor DDOS mitigation script. [2] I believe

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

2024-10-29 Thread tor-relays+tor-relays
of time. On 29/10/24 00:33, Pierre Bourdon wrote: Hi relay ops, A few hours ago I received a forwarded abuse report from Hetzner for one of my machines running a Tor relay (not exit). Some random ISP was claiming I was sending SSH connections to them, and at first I couldn't fin

Re: [tor-relays] Please check if your relay has fallen out of the consensus

2024-10-28 Thread tor-relays+tor-relays
On 28/10/24 20:30, denny.obre...@a-n-o-n-y-m-e.net wrote: As an update, once I showed the link from OONI to my ISP, they offered to move my server to another location at no charge. So the Tor server was moved from India to the UK. (Actually, I built a new one from scratch

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

2024-11-04 Thread tor-relays+tor-relays
On 1/11/24 22:42, Red Oaive via tor-relays wrote: On 2024-10-31 23:15, Neel Chauhan wrote: It would be hard to explain to Verizon I run Tor relays since they technically don't allow servers. I hope I'm not forced onto AT&T Internet Air as my particular co-op rental unit won

[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22

2024-11-08 Thread tor-relays+tor-relays
On 8/11/24 08:47, tor-relays+tor-rel...@queer.cat wrote: On 8/11/24 03:14, Red Oaive via tor-relays wrote: I just reset my SYN-ACK detection nft counter and it's still showing activity:    tcp sport 22 tcp flags == 0x12 counter packets 9 bytes 504 This rule will also count SYN-ACKs

Re: [tor-relays] Please check if your relay has fallen out of the consensus

2024-10-31 Thread tor-relays+tor-relays
email, hoping it is helpful, and will report back in a week. Can you check to see if your relay is in a similar situation? In particular, the situation to look for is "Tor process is still running fine from your perspective, but, relay-search (https://atlas.torproject.org/) says you are no l

[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22

2024-11-10 Thread tor-relays+tor-relays
enabled? On 9/11/24 23:15, tor-opera...@urdn.com.ua wrote: I can confirm that the attack has not stopped and that we continue to monitor spoofed packets with Tor relay's IP addresses including the addresses of relays that are at our network. This continues to trigger the sending of reports

[tor-relays] Re: Inquiry about a possible DDoS case

2024-11-06 Thread tor-relays+tor-relays
Is your server running a DNS server that's open to the internet on port 53? On 6/11/24 09:25, Jose A via tor-relays wrote: Hello everyone. I have received a communication from my ISP regarding the IP where I have a Middle Relay and a Bridge, informing me that this IP is being used

[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22

2024-11-08 Thread tor-relays+tor-relays
On 8/11/24 03:14, Red Oaive via tor-relays wrote: I just reset my SYN-ACK detection nft counter and it's still showing activity:   tcp sport 22 tcp flags == 0x12 counter packets 9 bytes 504 This rule will also count SYN-ACKs sent from your own server to bots trying to connect to you

<    1   2   3   4   5   6   7   8   9   10   >